Security management
Secure development lifecycle
To ensure the security, integrity, auditability, and reliability of the software development process and the final product, we introduce a set of practices throughout the entire development lifecycle. The scope and the character of these security practices are traditionally dictated by data privacy and security standards and requirements relevant to each client engagement.
0
Training
1
Initiation
2
Requirements analysis & design
3
Planning
4
Implementation
5
Delivery
0 Training
Signing the corporate NDA & network usage policy
Educating on secure development principles
1 Initiation
Handling extra security concerns
Deciding on the development environment
- Environment ownership or whether the development environment will be provided and managed by the client, Itransition, or a third-party vendor
- Components, technologies, and frameworks that will be used during the project, factoring in their compatibility, functionality, maturity, and security capabilities
- Security controls and access management to establish user accounts for all parties involved in the project and protect the development environment from unauthorized access
- Security and compliance requirements that define the configuration of the development environment
2 Requirements analysis & design
Identifying security & privacy requirements
- Client industry and solution type to outline its purpose, functionality, and threat landscape
- Data sensitivity and privacy or whether it includes personally identifiable information, confidential or private information, and financial records
- Applicable territory/industry standards, such as HIPAA, GDPR, and PCI DSS
Identifying & documenting sensitive information assets
We prepare a registry with all the sensitive information assets that our clients hand over to us during the project to guarantee that all sensitive data will be properly returned, erased, or disposed of at the end of the project.
Furthermore, we provide all parties involved in the project with the general guidelines for managing such data during the development lifecycle.
3 Planning
Planning secure development practices
4 Implementation
Security briefing for the team
- The development approach and practices, as well as tools selected for the project
- Specific security standards applicable to the project
- Extra security requirements, rules, and restrictions that must be understood and followed
Using approved development tools
Following established development practices
- Using a version control system for code management
- Setting up a code verification process with unit testing, code reviews, continuous integration, and static analysis
- Tracking, estimating, and managing accumulated technical debt
Leveraging internal technical supervision
5 Delivery
Conducting pre-delivery code review
- There is no unused code stored in the repository that can expose software to security risks
- Security credentials, access keys, license keys, and other sensitive project values are not hardcoded or stored in plain form
- Configuration values from development, staging, and production environments are stored separately with strict access control
Key security metrics
Threat modeling
- Number of threat modeling activities conducted
- Number of identified threats per model
- Severity of identified threatsÂ
- Time to mitigate identified threats
- Threat model review cycle time
Code reviews
- Number of code reviews conducted
- Number of findings from code reviews
- Code review coverage
- Code review efficiencyÂ
- Code quality improvement
Security testing
- Number of findings from penetration testing and vulnerability scanning
- Number of findings remediated
- Number of recurring findings
- Time to remediate a vulnerability
- Security testing coverage
Training activities
- Number of training activities conducted
- Training participation rate
- Training effectiveness score
- Incident reporting rate
Industry controls & frameworks we adhere to
About Itransition
IT consulting software development services since 1998
ISO 27001-certified security management system
Quality-first approach based on a robust ISO 9001-compliant quality management system
Certified security engineers, consultants, administrators, testers, and auditors